scispace - formally typeset
Search or ask a question
Topic

Signature recognition

About: Signature recognition is a research topic. Over the lifetime, 2138 publications have been published within this topic receiving 37605 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper , the authors focus on improving the human and machine interface, which should ensure efficient processing of data and knowledge in simple, fast and accessible ways, and they propose a signature recognition methodology that includes a verification methodology and processing of verification results.
Abstract: This article focuses on improving the human and machine interface, which should ensure efficient processing of data and knowledge in simple, fast and accessible ways. One of the ways to organize it is the introduction of the manuscript (entering text, drawings, drawings, etc.). Handwritten signatures can be considered as handwritten words, but they are more suitable for drawings, because the signer tries to make his signature unique, using not only his first and last names, but also additional graphic elements. Creating a signature is quite simple, although it is impossible to reproduce the recording speed. The signature has long been used to certify the authenticity of documents and verify (authenticate) an individual. In principle, the signature examination is used during the forensic examination. Signature recognition can be carried out by sequential verification of the signature to each known person. The signature recognition methodology includes a verification methodology and processing of verification results. One of the modern areas of interface improvement is the development and research of software for signature recognition and visualization. The advent of modern computer input tools has led to the emergence of a new type of online signature describing the signature creation process, not the result. Moreover, not only the coordinates of points on the line, but also a sequence of vectors of parameter values for each of the values of pressure, direction and speed of movement, the angle of adaptation of the pen and the signature time.
Proceedings ArticleDOI
04 Oct 2004
TL;DR: The robustness of the ETSI (European Telecommunication Standards Institute) standardized feature extraction schemes is investigated for phoneme based recognition tasks of German speech data and it turns out that fairly high recognition rates can be achieved also for noisy data when applying the second robust EtsI frontend.
Abstract: The robustness of the ETSI (European Telecommunication Standards Institute) standardized feature extraction schemes is investigated for phoneme based recognition tasks of German speech data. The recognition tasks are an isolated command word recognition and the recognition of connected digits. The motivation of this work is the easy extensibility of a whole word recognition system by allowing also the recognition of phoneme based word HMMs (Hidden Markov Models). The recognition performance has been determined for different numbers of HMM states and different numbers of Gaussians per state. It turns out that fairly high recognition rates can be achieved also for noisy data when applying the second robust ETSI frontend.
14 Nov 2012
TL;DR: A new algorithm is presented that is capable of recognizing each signature individually, which makes the system more efficient and robust, especially in banks which need to verify the customer’s signature on a regular basis.
Abstract: With the technology development over the past decades, it became necessary to provide secure recognition systems. The Optical Character Recognition (OCR) can be considered as one of the most useful software to offer security. It works on the principal of recognizing the patterns with the use of a computer algorithm. OCR has multiple uses in places that need security verification such as banks, elevators, police departments. Furthermore, it can be used in several categories simultaneously. There are two types of recognition. First is the static approach which is based on the information of the input. Second is the dynamic recognition which is more usable for recognition of speech. In fact, OCR will be one of the most important techniques for human computer interaction in future. However, in this paper we have used OCR as feature to implement our algorithm. We are presenting a new algorithm that is capable of recognizing each signature individually. This makes the system more efficient and robust,especially in banks which need to verify the customer’s signature on a regular basis. A highly efficient C# system was developed to implement the new algorithm.
Proceedings ArticleDOI
14 Nov 1988
TL;DR: A speaker-dependent pattern-matching approach to connected word recognition for Chinese using a set of isolated word tokens as the reference patterns using a fast dynamic-time-warping alignment procedure is presented.
Abstract: A speaker-dependent pattern-matching approach to connected word recognition for Chinese is presented. First, a method of adaptive energy normalization is applied to the speech spectrum, and a sound stimulus parameter is used to compress the normalized spectrum. Then, using a set of isolated word tokens as the reference patterns, a simplified dynamic programming-based matching strategy using a fast dynamic-time-warping alignment procedure is described. Experimental results for the recognition of a Chinese digit string (of unknown variable length from 2 to 5 digits), for two kinds of pronunciation (in standard Chinese and in the way used in telecommunication), are given. The correct string recognition rate is 96.8% and 97.6%, respectively. >
01 Jan 2010
TL;DR: This paper presents two approaches for static signature recognition using Support Vector Machines: pure SVM and SVM integrated with a multilayer perceptron Artificial Neural Network (SVM/ANN) to map the results of the SVM.
Abstract: This paper presents two approaches for static signature recognition using Support Vector Machines (SVM): pure SVM and SVM integrated with a multilayer perceptron Artificial Neural Network (SVM/ANN) to map the results of the SVM. Feature extraction as a pattern construction method was adopted. Best results were obtained with the 1-v-r multivaluated classification method. The rate of correctly identified signers was similar for both architectures. A practical advantage of SVM/ANN architecture was decreasing the error of confusing the actual signer with another one: when the model misclassified a signer, instead of classifying it as a wrong signer, the proposed architecture recognized it as unknown.

Network Information
Related Topics (5)
Feature extraction
111.8K papers, 2.1M citations
89% related
Image segmentation
79.6K papers, 1.8M citations
85% related
Feature (computer vision)
128.2K papers, 1.7M citations
85% related
Convolutional neural network
74.7K papers, 2M citations
83% related
Deep learning
79.8K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202310
202219
202122
202028
201925
201832